Across
- 2. Redundant copy kept for recovery
- 4. Deceptive lure to steal credentials
- 6. Converts readable data into cipher text
- 8. Code that leverages a flaw to gain access
- 10. Unplanned event that disrupts normal operations
- 12. Malicious software that harms systems
- 13. Malware that encrypts files for payment
- 16. Scientific analysis of evidence after an event
- 18. Weakness that an attacker can exploit
- 19. Highest-privileged user role
Down
- 1. Process that verifies a user’s claimed identity
- 3. Network of hijacked machines under one controller
- 5. Network barrier that filters unwanted traffic
- 7. Malware that secretly harvests user data
- 9. Malicious program disguised as legitimate
- 11. On-demand remote computing environment
- 14. Login method with two-plus factors (abbr.)
- 15. Proof of identity used to log in
- 17. Traffic-filtering barrier between networks
- 18. Encrypted tunnel over public networks (abbr.)
